Google llc (20240204991). METHODS FOR PROTECTING PRIVACY simplified abstract
Contents
- 1 METHODS FOR PROTECTING PRIVACY
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHODS FOR PROTECTING PRIVACY - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Secure Data Sharing and Communication Technology
- 1.13 Original Abstract Submitted
METHODS FOR PROTECTING PRIVACY
Organization Name
Inventor(s)
Sarvar Patel of Montville NJ (US)
Marcel M.M. Yung of New York NY (US)
Gang Wang of Frederick MD (US)
Mariana Raykova of New York NY (US)
Benjamin R. Kreuter of Jersey City NJ (US)
Ananth Raghunathan of Mountain View CA (US)
METHODS FOR PROTECTING PRIVACY - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240204991 titled 'METHODS FOR PROTECTING PRIVACY
Simplified Explanation
The method described in the patent application involves client devices receiving data items, encrypting them using a public key, engaging in an oblivious pseudorandom function protocol to generate a seed, and generating encrypted secret shares using a threshold secret sharing function. These encrypted secret shares are then transmitted to a computing system for processing.
- Client devices receive data items and encrypt them using a public key.
- An oblivious pseudorandom function protocol is used to generate a seed.
- Encrypted secret shares are generated using a threshold secret sharing function.
- The encrypted secret shares are transmitted to a computing system for processing.
Key Features and Innovation
- Data encryption using a public key.
- Oblivious pseudorandom function protocol for seed generation.
- Threshold secret sharing function for encrypted secret share generation.
Potential Applications
This technology can be applied in secure data sharing, confidential communication, and privacy-preserving computations.
Problems Solved
This technology addresses the need for secure data transmission and confidential information sharing.
Benefits
- Enhanced data security.
- Confidential communication.
- Privacy-preserving computations.
Commercial Applications
Title: Secure Data Sharing and Communication Technology This technology can be utilized in industries such as healthcare, finance, and government for secure data sharing and confidential communication. It can also be used in research institutions for privacy-preserving computations.
Prior Art
Further research can be conducted in the field of secure data sharing, threshold secret sharing functions, and oblivious pseudorandom function protocols to explore prior art related to this technology.
Frequently Updated Research
Researchers are constantly exploring advancements in secure data sharing technologies, threshold secret sharing functions, and privacy-preserving computations. Stay updated on the latest developments in these areas for further insights.
Questions about Secure Data Sharing and Communication Technology
1. How does the technology ensure data security?
The technology ensures data security through encryption using public keys and threshold secret sharing functions, making it difficult for unauthorized parties to access sensitive information.
2. What industries can benefit from this technology?
Various industries such as healthcare, finance, and government can benefit from this technology for secure data sharing and confidential communication.
Original Abstract Submitted
a method including at each of a number of client devices receiving a data item, receiving a public key from a second computing system, encrypting the data item using the public key to produce a singly encrypted data item, engaging in an oblivious pseudorandom function protocol with a first computing system using the singly encrypted data item to produce a seed, generating an encrypted secret share using a threshold secret sharing function under which the encrypted secret share cannot be decrypted until a threshold number of encrypted secret shares associated with the same singly encrypted data item are received, and transmitting the encrypted secret share to the first computing system and at the first computing system receiving a number of encrypted secret shares from the number of client devices, processing the number of encrypted secret shares to produce processed data, and transmitting the processed data to a second computing system.